HIGH · 8.8

CVE-2023-46142

A incorrect permission assignment for critical resource vulnerability in PLCnext products allows an remote attacker with low privileges to gain full access on the affected devices.

Vulnerability Description

A incorrect permission assignment for critical resource vulnerability in PLCnext products allows an remote attacker with low privileges to gain full access on the affected devices.

CVSS Score

8.8

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
PhoenixcontactAxc F 1152 Firmware<= 2024.0
PhoenixcontactAxc F 1152-
PhoenixcontactAxc F 2152 Firmware<= 2024.0
PhoenixcontactAxc F 2152-
PhoenixcontactAxc F 3152 Firmware<= 2024.0
PhoenixcontactAxc F 3152-
PhoenixcontactBpc 9102S Firmware<= 2024.0
PhoenixcontactBpc 9102S-
PhoenixcontactEpc 1502 Firmware<= 2024.0
PhoenixcontactEpc 1502-
PhoenixcontactEpc 1522 Firmware<= 2024.0
PhoenixcontactEpc 1522-
PhoenixcontactPlcnext Engineer<= 2024.0
PhoenixcontactRfc 4072R Firmware<= 2024.0
PhoenixcontactRfc 4072R-
PhoenixcontactRfc 4072S Firmware<= 2024.0
PhoenixcontactRfc 4072S-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2023-46142?

CVE-2023-46142 is a vulnerability with a CVSS score of 8.8 (HIGH). A incorrect permission assignment for critical resource vulnerability in PLCnext products allows an remote attacker with low privileges to gain full access on the affected devices.

How severe is CVE-2023-46142?

CVE-2023-46142 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2023-46142?

Check the references section above for vendor advisories and patch information. Affected products include: Phoenixcontact Axc F 1152 Firmware, Phoenixcontact Axc F 1152, Phoenixcontact Axc F 2152 Firmware, Phoenixcontact Axc F 2152, Phoenixcontact Axc F 3152 Firmware.